Now showing items 1-13 of 13

• #### Architecture framework for software safety ﻿

(Springer, 2014-09)
Currently, an increasing number of systems are controlled by soft- ware and rely on the correct operation of software. In this context, a safety- critical system is defined as a system in which malfunctioning software could ...
• #### Capture resilient ElGamal signature protocols ﻿

(Springer, 2006-11)
One of the fundamental problems of public key cryptography is protecting the private key. Private keys are too long to be remembered by the user, and storing them in the device which performs the private key operation is ...
• #### A communication scheme by using synchronized chaotic systems ﻿

(IEEE, 1996)
A method to synchronize systems with chaotic behavior, in a master-slave configuration adapted to communication systems, is discussed. This work is motivated by the need for secure communication. In this method, the ...
• #### Differential entropy analysis of the IDEA block cipher ﻿

(Elsevier, 2014)
This paper describes a new cryptanalytic technique that combines differential cryptanalysis with Shannon entropy. We call it differential entropy (DE). The objective is to exploit the non-uniform distribution of output ...
• #### G-free: Defeating return-oriented programming through gadget-less binaries ﻿

(ACM, 2010-12)
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still represents a serious threat to the security of ...
• #### Imaging capability of pseudomorphic high electron mobility transistors, AlGaN/GaN, and Si micro-Hall probes for scanning Hall probe microscopy between 25 and 125 °c ﻿

(American Vacuum Society, 2009)
The authors present a comparative study on imaging capabilities of three different micro-Hall probe sensors fabricated from narrow and wide band gap semiconductors for scanning hall probe microscopy at variable temperatures. ...
• #### Improved DST cryptanalysis of IDEA ﻿

(Springer, 2006-08)
In this paper, we show how the Demirci-Selcuk-Ture attack, which is currently the deepest penetrating attack on the IDEA block cipher, can be improved significantly in performance. The improvements presented reduce the ...
• #### Modeling urbanization using building patterns ﻿

(2007)
Automatic extraction of buildings and modeling of their spatial arrangements provide essential information for urban applications. This paper describes our work on modeling urbanization using spatial building patterns. ...
• #### Online balancing two independent criteria ﻿

(Springer, 2008-10)
We study the online bicriteria load balancing problem in this paper. We choose a system of distributed homogeneous file servers located in a cluster as the scenario and propose two online approximate algorithms for balancing ...
• #### Online bicriteria load balancing using object reallocation ﻿

(Institute of Electrical and Electronics Engineers, 2009-03)
We study the bicriteria load balancing problem on two independent parameters under the allowance of object reallocation. The scenario is a system of $M$ distributed file servers located in a cluster, and we propose three ...
• #### A scratch-pad memory aware dynamic loop scheduling algorithm ﻿

(IEEE, 2008-03)
Executing array based applications on a chip multiprocessor requires effective loop parallelization techniques. One of the critical issues that need to be tackled by an optimizing compiler in this context is loop scheduling, ...
• #### A strong user authentication protocol for GSM ﻿

(IEEE, 2005-06)
Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings certain limitations and restrictions on the functionality ...